Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Hiding Process Memory via Anti-Forensic Techniques

Black Hat via YouTube

Overview

Explore advanced anti-forensic techniques for hiding process memory in this 37-minute Black Hat conference talk. Delve into three novel methods that prevent malicious user space memory from appearing in analysis tools and make it inaccessible to security analysts. Learn about process address space, paging, PTE subversions, remapping, and erasure. Evaluate the effectiveness of these techniques against memory and live forensics. Examine considerations for modified PFN remapping on Windows, MAS remapping detection, and PTE subversion detection on both Windows and Linux. Analyze shared memory subversion detection, test environments, and detection evaluation across operating systems. Compare these techniques from an attacker's perspective, and discuss limitations and future work in this field of anti-forensic research.

Syllabus

Intro
Agenda
Introduction
Process Address Space
Paging
Overview
PTE Subversions
PTE Remapping
PTE Erasure
Evaluation - Memory Forensics
Evaluation - Live Forensics
Considerations
Modified PFN Remapping on Windows
MAS Remapping Detection
PTE Subversion Detection - Windows
PTE Subversion Detection - Linux
Shared Memory Subversion Detection
Test environment
Detection Evaluation - Windows
Detection Evaluation - Linux
False Positives - Windows
False Positives - Linux
Comparison - Attacker's Point of View
Conclusion
Limitations
Future Work

Taught by

Black Hat

Reviews

Start your review of Hiding Process Memory via Anti-Forensic Techniques

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.